Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.
I. Struktur Sistem Operasi 1. Komponen-komponen Sistem 1.1. Manajemen Proses 1.2. Manajemen Memori Utama 1.3. Manajemen Memori Sekunder 1.4. Manajemen I/O 1.5. Manajemen File 2. Pelayanan Sistem Operasi 3. System Call 4. Sistem Program 5. Struktur Sistem Operasi 5.1. Struktur Sederhana 5.2. Monolithic System 5.3. Pendekatan Berlapis (Layered Approach) 5.4. Mesin Virtual 5.5. Client System Model
II. Manajemen Proses 1. Konsep Proses 1.1. Definisi Proses 1.2. Status Proses 1.3. Process Control Block (PCB) 2. Konsep Penjadualan 2.1. Scheduling Queue 2.2. Schedulers 2.3. Context Switch 3. Operasi pada proses 3.1. Pembuatan Proses 3.2. Penghentian Proses 4. Proses yang Saling Bekerjasama (Cooperating Process) 5. Threads 6. Komunikasi Antar Proses 7. Buffering 8. Kondisi-kondisi Perkecualian 8.1. Proses Dihentikan 8.2. Kehilangan Pesan 8.3. Proses Terganggu
Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.
III. Penjadualan Proses 1. Konsep Dasar Penjadualan Proses 1.1. Preemptive Scheduling 1.2. Dispatcher 2. Kriteria Penjadualan 3. Algoritma Penjadualan 3.1 First Come First Served Scheduling(FCFS) 3.2 Shortest Job First Scheduling (SJF) 3.3 Priority Scheduling 3.4 Round Robin Scheduling 3.5 Multilevel Queue Scheduling 3.6 Multilevel Feedback Queue Scheduling 3.7 Guaranteed Scheduling 3.8 Multiple Processor Scheduling 4. Metode Evaluasi Penjadwalan IV. Sinkronisasi dan Deadlock 1. Masalah Critical Section 2. Sinkronisasi Software 3. Sinkronisasi Hardware 4. Semaphore 5. Masalah-masalah Klasik dalam Sinkronisasi 6. Deadlock 6.1. Model Sistem 6.2. Karakteristik Deadlock 6.3. Metode penanganan Deadlock 6.4. Pencegahan Deadlock 6.5. Penghindaran Deadlock 6.6. Pendeteksian Deadlock 6.7. Recovery Deadlock 6.8. Pendekatan Kombinasai untuk Menghindari Deadlock
Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.
V. Manajemen Memory 1. Konsep Dasar Memori 1.1. Konsep Binding 1.2. Dynamic Loading 1.3. Dynamic Linking 1.4. Overlay 2. Strategi Manajemen Memori 3. Ruang Alamat Logika dan Fisik 4. Swapping 5. Pencatatan Pemakaian Memori 5.1. Peta Bit 5.2. Linked List 6. Monoprogramming 7. Pengalolasian Berurutan (Contigous Allocation) 7.1. Multiprogramming dengan Partisi Statis 7.2. Multiprogramming dengan Partisi Dinamis 7.3. Sistem Buddy 8. Pengalokasian Tak Berurutan (Non Contigous Allocation) 8.1. Paging 8.2. Segmentasi VI. Virtual Memori 1. Konsep dasar memori virtual 2. Demand Paging 3. Unjuk Kerja Demand Paging 4. Page Replacement 5. Algoritma Page Replacement 5.1. Algoritma FIFO 5.2. Algoritma Optimal 5.3. Algoritma Least Recently Use (LRU) 6. Pengalokasian Frame 6.1. Algoritma Pengalokasian 6.2. Algoritma Global dan Lokal 7. Trasing
Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.
VII. Manajemen Sistem File 1. Interface Sistem File 1.1. Konsep File 1.2. Metode Akses 1.3. Struktur Direktori 1.4. Proteksi 2. Implementasi Sistem File 2.1. Struktur Sistem File 2.2. Metode Pengalokasian 2.3. Manajemen Ruang Kosong 2.4. Implementasi Direktori 2.5. Efisiensi dan Unjuk Kerja 2.6. Recovery VIII. Manajemen Sistem Input/Output 1. Prinsip Perangkat Keras I/O 1.1 I/O Device 1.2 Device Controller 1.3 Direct Memory Access (DMA) 2. Prinsip Perangkat Lunak I/O 2.1 Tujuan Perangkat Lunak I/O 2.2 Interrupt Handler 2.3 Device Drivers 2.4 Device-Independent I/O Software 2.5 User-Space I/O Software 3. Disk 3.1 Struktur Disk 3.2 Penjadualan Disk 3.2.1. First Come First Served Scheduling 3.2.2. Shortest Seek Time First Scheduling 3.2.3. SCAN Scheduling 3.2.4. C-SCAN Scehduling 3.2.5. Look Scheduling 3.3. Disk Management 3.4. Swap Space Management 3.5. Disk Reliabiliy
Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.
IX. Proteksi dan Sekuriti Sistem Komputer 1. Proteksi 1.1. Tujuan dari Proteksi 1.2. Domain Proteksi 1.3. Matriks Akses 1.4. Revokasi Hak Akses 1.5. Sistem Berdasarkan Kapabilitas 1.6. Proteksi Berdasarkan Bahasa 2. Sekuriti 2.1. Masalah Sekuriti 2.2. Autentikasi 2.3. Ancaman Program 2.4. Ancaman Sistem 2.5. Monitoring Ancaman 2.6. Enkripsi